1 | //! Diffie-Hellman key agreement. |
2 | |
3 | use cfg_if::cfg_if; |
4 | use foreign_types::{ForeignType, ForeignTypeRef}; |
5 | use std::mem; |
6 | use std::ptr; |
7 | |
8 | use crate::bn::{BigNum, BigNumRef}; |
9 | use crate::error::ErrorStack; |
10 | use crate::pkey::{HasParams, HasPrivate, HasPublic, Params, Private, Public}; |
11 | use crate::{cvt, cvt_p}; |
12 | use openssl_macros::corresponds; |
13 | |
14 | generic_foreign_type_and_impl_send_sync! { |
15 | type CType = ffi::DH; |
16 | fn drop = ffi::DH_free; |
17 | |
18 | pub struct Dh<T>; |
19 | |
20 | pub struct DhRef<T>; |
21 | } |
22 | |
23 | impl<T> DhRef<T> |
24 | where |
25 | T: HasParams, |
26 | { |
27 | to_pem! { |
28 | /// Serializes the parameters into a PEM-encoded PKCS#3 DHparameter structure. |
29 | /// |
30 | /// The output will have a header of `-----BEGIN DH PARAMETERS-----`. |
31 | #[corresponds (PEM_write_bio_DHparams)] |
32 | params_to_pem, |
33 | ffi::PEM_write_bio_DHparams |
34 | } |
35 | |
36 | to_der! { |
37 | /// Serializes the parameters into a DER-encoded PKCS#3 DHparameter structure. |
38 | #[corresponds (i2d_DHparams)] |
39 | params_to_der, |
40 | ffi::i2d_DHparams |
41 | } |
42 | |
43 | /// Validates DH parameters for correctness |
44 | #[corresponds (DH_check_key)] |
45 | pub fn check_key(&self) -> Result<bool, ErrorStack> { |
46 | unsafe { |
47 | let mut codes = 0; |
48 | cvt(ffi::DH_check(self.as_ptr(), &mut codes))?; |
49 | Ok(codes == 0) |
50 | } |
51 | } |
52 | } |
53 | |
54 | impl Dh<Params> { |
55 | pub fn from_params(p: BigNum, g: BigNum, q: BigNum) -> Result<Dh<Params>, ErrorStack> { |
56 | Self::from_pqg(p, Some(q), g) |
57 | } |
58 | |
59 | /// Creates a DH instance based upon the given primes and generator params. |
60 | #[corresponds (DH_set0_pqg)] |
61 | pub fn from_pqg( |
62 | prime_p: BigNum, |
63 | prime_q: Option<BigNum>, |
64 | generator: BigNum, |
65 | ) -> Result<Dh<Params>, ErrorStack> { |
66 | unsafe { |
67 | let dh = Dh::from_ptr(cvt_p(ffi::DH_new())?); |
68 | cvt(DH_set0_pqg( |
69 | dh.0, |
70 | prime_p.as_ptr(), |
71 | prime_q.as_ref().map_or(ptr::null_mut(), |q| q.as_ptr()), |
72 | generator.as_ptr(), |
73 | ))?; |
74 | mem::forget((prime_p, prime_q, generator)); |
75 | Ok(dh) |
76 | } |
77 | } |
78 | |
79 | /// Sets the public key on the DH object. |
80 | pub fn set_public_key(self, pub_key: BigNum) -> Result<Dh<Public>, ErrorStack> { |
81 | unsafe { |
82 | let dh_ptr = self.0; |
83 | cvt(DH_set0_key(dh_ptr, pub_key.as_ptr(), ptr::null_mut()))?; |
84 | mem::forget((self, pub_key)); |
85 | Ok(Dh::from_ptr(dh_ptr)) |
86 | } |
87 | } |
88 | |
89 | /// Sets the private key on the DH object and recomputes the public key. |
90 | pub fn set_private_key(self, priv_key: BigNum) -> Result<Dh<Private>, ErrorStack> { |
91 | unsafe { |
92 | let dh_ptr = self.0; |
93 | cvt(DH_set0_key(dh_ptr, ptr::null_mut(), priv_key.as_ptr()))?; |
94 | mem::forget(priv_key); |
95 | |
96 | cvt(ffi::DH_generate_key(dh_ptr))?; |
97 | mem::forget(self); |
98 | Ok(Dh::from_ptr(dh_ptr)) |
99 | } |
100 | } |
101 | |
102 | /// Sets the public and private keys on the DH object. |
103 | pub fn set_key(self, pub_key: BigNum, priv_key: BigNum) -> Result<Dh<Private>, ErrorStack> { |
104 | unsafe { |
105 | let dh_ptr = self.0; |
106 | cvt(DH_set0_key(dh_ptr, pub_key.as_ptr(), priv_key.as_ptr()))?; |
107 | mem::forget((self, pub_key, priv_key)); |
108 | Ok(Dh::from_ptr(dh_ptr)) |
109 | } |
110 | } |
111 | |
112 | /// Generates DH params based on the given `prime_len` and a fixed `generator` value. |
113 | #[corresponds (DH_generate_parameters_ex)] |
114 | pub fn generate_params(prime_len: u32, generator: u32) -> Result<Dh<Params>, ErrorStack> { |
115 | unsafe { |
116 | let dh = Dh::from_ptr(cvt_p(ffi::DH_new())?); |
117 | cvt(ffi::DH_generate_parameters_ex( |
118 | dh.0, |
119 | prime_len as i32, |
120 | generator as i32, |
121 | ptr::null_mut(), |
122 | ))?; |
123 | Ok(dh) |
124 | } |
125 | } |
126 | |
127 | /// Generates a public and a private key based on the DH params. |
128 | #[corresponds (DH_generate_key)] |
129 | pub fn generate_key(self) -> Result<Dh<Private>, ErrorStack> { |
130 | unsafe { |
131 | let dh_ptr = self.0; |
132 | cvt(ffi::DH_generate_key(dh_ptr))?; |
133 | mem::forget(self); |
134 | Ok(Dh::from_ptr(dh_ptr)) |
135 | } |
136 | } |
137 | |
138 | from_pem! { |
139 | /// Deserializes a PEM-encoded PKCS#3 DHpararameters structure. |
140 | /// |
141 | /// The input should have a header of `-----BEGIN DH PARAMETERS-----`. |
142 | #[corresponds (PEM_read_bio_DHparams)] |
143 | params_from_pem, |
144 | Dh<Params>, |
145 | ffi::PEM_read_bio_DHparams |
146 | } |
147 | |
148 | from_der! { |
149 | /// Deserializes a DER-encoded PKCS#3 DHparameters structure. |
150 | #[corresponds (d2i_DHparams)] |
151 | params_from_der, |
152 | Dh<Params>, |
153 | ffi::d2i_DHparams |
154 | } |
155 | |
156 | /// Requires OpenSSL 1.0.2 or newer. |
157 | #[corresponds (DH_get_1024_160)] |
158 | #[cfg (any(ossl102, ossl110))] |
159 | pub fn get_1024_160() -> Result<Dh<Params>, ErrorStack> { |
160 | unsafe { |
161 | ffi::init(); |
162 | cvt_p(ffi::DH_get_1024_160()).map(|p| Dh::from_ptr(p)) |
163 | } |
164 | } |
165 | |
166 | /// Requires OpenSSL 1.0.2 or newer. |
167 | #[corresponds (DH_get_2048_224)] |
168 | #[cfg (any(ossl102, ossl110))] |
169 | pub fn get_2048_224() -> Result<Dh<Params>, ErrorStack> { |
170 | unsafe { |
171 | ffi::init(); |
172 | cvt_p(ffi::DH_get_2048_224()).map(|p| Dh::from_ptr(p)) |
173 | } |
174 | } |
175 | |
176 | /// Requires OpenSSL 1.0.2 or newer. |
177 | #[corresponds (DH_get_2048_256)] |
178 | #[cfg (any(ossl102, ossl110))] |
179 | pub fn get_2048_256() -> Result<Dh<Params>, ErrorStack> { |
180 | unsafe { |
181 | ffi::init(); |
182 | cvt_p(ffi::DH_get_2048_256()).map(|p| Dh::from_ptr(p)) |
183 | } |
184 | } |
185 | } |
186 | |
187 | impl<T> Dh<T> |
188 | where |
189 | T: HasParams, |
190 | { |
191 | /// Returns the prime `p` from the DH instance. |
192 | #[corresponds (DH_get0_pqg)] |
193 | pub fn prime_p(&self) -> &BigNumRef { |
194 | let mut p = ptr::null(); |
195 | unsafe { |
196 | DH_get0_pqg(self.as_ptr(), &mut p, ptr::null_mut(), ptr::null_mut()); |
197 | BigNumRef::from_ptr(p as *mut _) |
198 | } |
199 | } |
200 | |
201 | /// Returns the prime `q` from the DH instance. |
202 | #[corresponds (DH_get0_pqg)] |
203 | pub fn prime_q(&self) -> Option<&BigNumRef> { |
204 | let mut q = ptr::null(); |
205 | unsafe { |
206 | DH_get0_pqg(self.as_ptr(), ptr::null_mut(), &mut q, ptr::null_mut()); |
207 | if q.is_null() { |
208 | None |
209 | } else { |
210 | Some(BigNumRef::from_ptr(q as *mut _)) |
211 | } |
212 | } |
213 | } |
214 | |
215 | /// Returns the generator from the DH instance. |
216 | #[corresponds (DH_get0_pqg)] |
217 | pub fn generator(&self) -> &BigNumRef { |
218 | let mut g = ptr::null(); |
219 | unsafe { |
220 | DH_get0_pqg(self.as_ptr(), ptr::null_mut(), ptr::null_mut(), &mut g); |
221 | BigNumRef::from_ptr(g as *mut _) |
222 | } |
223 | } |
224 | } |
225 | |
226 | impl<T> DhRef<T> |
227 | where |
228 | T: HasPublic, |
229 | { |
230 | /// Returns the public key from the DH instance. |
231 | #[corresponds (DH_get0_key)] |
232 | pub fn public_key(&self) -> &BigNumRef { |
233 | let mut pub_key: *const BIGNUM = ptr::null(); |
234 | unsafe { |
235 | DH_get0_key(self.as_ptr(), &mut pub_key, priv_key:ptr::null_mut()); |
236 | BigNumRef::from_ptr(pub_key as *mut _) |
237 | } |
238 | } |
239 | } |
240 | |
241 | impl<T> DhRef<T> |
242 | where |
243 | T: HasPrivate, |
244 | { |
245 | /// Computes a shared secret from the own private key and the given `public_key`. |
246 | #[corresponds (DH_compute_key)] |
247 | pub fn compute_key(&self, public_key: &BigNumRef) -> Result<Vec<u8>, ErrorStack> { |
248 | unsafe { |
249 | let key_len = ffi::DH_size(self.as_ptr()); |
250 | let mut key = vec![0u8; key_len as usize]; |
251 | cvt(ffi::DH_compute_key( |
252 | key.as_mut_ptr(), |
253 | public_key.as_ptr(), |
254 | self.as_ptr(), |
255 | ))?; |
256 | Ok(key) |
257 | } |
258 | } |
259 | |
260 | /// Returns the private key from the DH instance. |
261 | #[corresponds (DH_get0_key)] |
262 | pub fn private_key(&self) -> &BigNumRef { |
263 | let mut priv_key = ptr::null(); |
264 | unsafe { |
265 | DH_get0_key(self.as_ptr(), ptr::null_mut(), &mut priv_key); |
266 | BigNumRef::from_ptr(priv_key as *mut _) |
267 | } |
268 | } |
269 | } |
270 | |
271 | cfg_if! { |
272 | if #[cfg(any(ossl110, libressl270, boringssl))] { |
273 | use ffi::{DH_set0_pqg, DH_get0_pqg, DH_get0_key, DH_set0_key}; |
274 | } else { |
275 | #[allow (bad_style)] |
276 | unsafe fn DH_set0_pqg( |
277 | dh: *mut ffi::DH, |
278 | p: *mut ffi::BIGNUM, |
279 | q: *mut ffi::BIGNUM, |
280 | g: *mut ffi::BIGNUM, |
281 | ) -> ::libc::c_int { |
282 | (*dh).p = p; |
283 | (*dh).q = q; |
284 | (*dh).g = g; |
285 | 1 |
286 | } |
287 | |
288 | #[allow (bad_style)] |
289 | unsafe fn DH_get0_pqg( |
290 | dh: *mut ffi::DH, |
291 | p: *mut *const ffi::BIGNUM, |
292 | q: *mut *const ffi::BIGNUM, |
293 | g: *mut *const ffi::BIGNUM, |
294 | ) { |
295 | if !p.is_null() { |
296 | *p = (*dh).p; |
297 | } |
298 | if !q.is_null() { |
299 | *q = (*dh).q; |
300 | } |
301 | if !g.is_null() { |
302 | *g = (*dh).g; |
303 | } |
304 | } |
305 | |
306 | #[allow (bad_style)] |
307 | unsafe fn DH_set0_key( |
308 | dh: *mut ffi::DH, |
309 | pub_key: *mut ffi::BIGNUM, |
310 | priv_key: *mut ffi::BIGNUM, |
311 | ) -> ::libc::c_int { |
312 | (*dh).pub_key = pub_key; |
313 | (*dh).priv_key = priv_key; |
314 | 1 |
315 | } |
316 | |
317 | #[allow (bad_style)] |
318 | unsafe fn DH_get0_key( |
319 | dh: *mut ffi::DH, |
320 | pub_key: *mut *const ffi::BIGNUM, |
321 | priv_key: *mut *const ffi::BIGNUM, |
322 | ) { |
323 | if !pub_key.is_null() { |
324 | *pub_key = (*dh).pub_key; |
325 | } |
326 | if !priv_key.is_null() { |
327 | *priv_key = (*dh).priv_key; |
328 | } |
329 | } |
330 | } |
331 | } |
332 | |
333 | #[cfg (test)] |
334 | mod tests { |
335 | use crate::bn::BigNum; |
336 | use crate::dh::Dh; |
337 | #[cfg (all(not(boringssl), ossl110))] |
338 | use crate::pkey::PKey; |
339 | use crate::ssl::{SslContext, SslMethod}; |
340 | |
341 | #[test ] |
342 | #[cfg (ossl102)] |
343 | fn test_dh_rfc5114() { |
344 | let mut ctx = SslContext::builder(SslMethod::tls()).unwrap(); |
345 | let dh2 = Dh::get_2048_224().unwrap(); |
346 | ctx.set_tmp_dh(&dh2).unwrap(); |
347 | let dh3 = Dh::get_2048_256().unwrap(); |
348 | ctx.set_tmp_dh(&dh3).unwrap(); |
349 | } |
350 | |
351 | #[test ] |
352 | fn test_dh_params() { |
353 | let mut ctx = SslContext::builder(SslMethod::tls()).unwrap(); |
354 | let prime_p = BigNum::from_hex_str( |
355 | "87A8E61DB4B6663CFFBBD19C651959998CEEF608660DD0F25D2CEED4435E3B00E00DF8F1D61957D4FAF7DF\ |
356 | 4561B2AA3016C3D91134096FAA3BF4296D830E9A7C209E0C6497517ABD5A8A9D306BCF67ED91F9E6725B47\ |
357 | 58C022E0B1EF4275BF7B6C5BFC11D45F9088B941F54EB1E59BB8BC39A0BF12307F5C4FDB70C581B23F76B6\ |
358 | 3ACAE1CAA6B7902D52526735488A0EF13C6D9A51BFA4AB3AD8347796524D8EF6A167B5A41825D967E144E5\ |
359 | 140564251CCACB83E6B486F6B3CA3F7971506026C0B857F689962856DED4010ABD0BE621C3A3960A54E710\ |
360 | C375F26375D7014103A4B54330C198AF126116D2276E11715F693877FAD7EF09CADB094AE91E1A1597" , |
361 | ).unwrap(); |
362 | let prime_q = BigNum::from_hex_str( |
363 | "3FB32C9B73134D0B2E77506660EDBD484CA7B18F21EF205407F4793A1A0BA12510DBC15077BE463FFF4FED\ |
364 | 4AAC0BB555BE3A6C1B0C6B47B1BC3773BF7E8C6F62901228F8C28CBB18A55AE31341000A650196F931C77A\ |
365 | 57F2DDF463E5E9EC144B777DE62AAAB8A8628AC376D282D6ED3864E67982428EBC831D14348F6F2F9193B5\ |
366 | 045AF2767164E1DFC967C1FB3F2E55A4BD1BFFE83B9C80D052B985D182EA0ADB2A3B7313D3FE14C8484B1E\ |
367 | 052588B9B7D2BBD2DF016199ECD06E1557CD0915B3353BBB64E0EC377FD028370DF92B52C7891428CDC67E\ |
368 | B6184B523D1DB246C32F63078490F00EF8D647D148D47954515E2327CFEF98C582664B4C0F6CC41659" , |
369 | ).unwrap(); |
370 | let generator = BigNum::from_hex_str( |
371 | "8CF83642A709A097B447997640129DA299B1A47D1EB3750BA308B0FE64F5FBD3" , |
372 | ) |
373 | .unwrap(); |
374 | let dh = Dh::from_params( |
375 | prime_p.to_owned().unwrap(), |
376 | generator.to_owned().unwrap(), |
377 | prime_q.to_owned().unwrap(), |
378 | ) |
379 | .unwrap(); |
380 | ctx.set_tmp_dh(&dh).unwrap(); |
381 | |
382 | assert_eq!(dh.prime_p(), &prime_p); |
383 | assert_eq!(dh.prime_q().unwrap(), &prime_q); |
384 | assert_eq!(dh.generator(), &generator); |
385 | } |
386 | |
387 | #[test ] |
388 | #[cfg (all(not(boringssl), ossl110))] |
389 | fn test_from_dhx_serializes_q() { |
390 | let p = BigNum::from_hex_str("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" ).unwrap(); |
391 | let g = BigNum::from_hex_str("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" ).unwrap(); |
392 | let q = BigNum::from_hex_str("00801c0d34c58d93fe997177101f80535a4738cebcbf389a99b36371eb" ) |
393 | .unwrap(); |
394 | let y = BigNum::from_hex_str("0082c165bb576243ecf46d58c3d1501616955fca0320fa95ea11d2e6c1b9cf217676720dc1c08c85bf20c4d232b60a29a1e51c7b773bc645014587c525c86151b30d75486ec7b6c98efb5f74955b83116d01d0af1232af89213c2de574369d701aba9357300b920d3d8b98252d46c46952c16a5f33554b38317809c7b9add4701f5c158c1b7035e9fe39366ececb90d2896b78c523c4a577287ef5ba7a2663ed58aa20b5ec66e30f316610dfaa38583e495ab6af771c284387e660edbef4edb872e2e80e1d244ee95622e76d028e61c1e887c2aa792717362139f4dd26eafd49b2366eeb2350b01fe1b56022a2809e379559c37b375ba01c4eaacc14fd1b247837" ).unwrap(); |
395 | |
396 | let dh = Dh::from_params(p, g, q).unwrap(); |
397 | let dh = dh.set_public_key(y).unwrap(); |
398 | |
399 | // Verify that 'q' is serialized in the public key. |
400 | let pkey = PKey::from_dhx(dh).unwrap(); |
401 | assert_eq!(pkey.public_key_to_der().unwrap(), b" \x30\x82\x03\x44\x30\x82\x02\x36\x06\x07\x2a\x86\x48\xce\x3e\x02\x01\x30\x82\x02\x29\x02\x82\x01\x01\x00\xad\x10\x7e\x1e\x91\x23\xa9\xd0\xd6\x60\xfa\xa7\x95\x59\xc5\x1f\xa2\x0d\x64\xe5\x68\x3b\x9f\xd1\xb5\x4b\x15\x97\xb6\x1d\x0a\x75\xe6\xfa\x14\x1d\xf9\x5a\x56\xdb\xaf\x9a\x3c\x40\x7b\xa1\xdf\x15\xeb\x3d\x68\x8a\x30\x9c\x18\x0e\x1d\xe6\xb8\x5a\x12\x74\xa0\xa6\x6d\x3f\x81\x52\xad\x6a\xc2\x12\x90\x37\xc9\xed\xef\xda\x4d\xf8\xd9\x1e\x8f\xef\x55\xb7\x39\x4b\x7a\xd5\xb7\xd0\xb6\xc1\x22\x07\xc9\xf9\x8d\x11\xed\x34\xdb\xf6\xc6\xba\x0b\x2c\x8b\xbc\x27\xbe\x6a\x00\xe0\xa0\xb9\xc4\x97\x08\xb3\xbf\x8a\x31\x70\x91\x88\x36\x81\x28\x61\x30\xbc\x89\x85\xdb\x16\x02\xe7\x14\x41\x5d\x93\x30\x27\x82\x73\xc7\xde\x31\xef\xdc\x73\x10\xf7\x12\x1f\xd5\xa0\x74\x15\x98\x7d\x9a\xdc\x0a\x48\x6d\xcd\xf9\x3a\xcc\x44\x32\x83\x87\x31\x5d\x75\xe1\x98\xc6\x41\xa4\x80\xcd\x86\xa1\xb9\xe5\x87\xe8\xbe\x60\xe6\x9c\xc9\x28\xb2\xb9\xc5\x21\x72\xe4\x13\x04\x2e\x9b\x23\xf1\x0b\x0e\x16\xe7\x97\x63\xc9\xb5\x3d\xcf\x4b\xa8\x0a\x29\xe3\xfb\x73\xc1\x6b\x8e\x75\xb9\x7e\xf3\x63\xe2\xff\xa3\x1f\x71\xcf\x9d\xe5\x38\x4e\x71\xb8\x1c\x0a\xc4\xdf\xfe\x0c\x10\xe6\x4f\x02\x82\x01\x01\x00\xac\x40\x32\xef\x4f\x2d\x9a\xe3\x9d\xf3\x0b\x5c\x8f\xfd\xac\x50\x6c\xde\xbe\x7b\x89\x99\x8c\xaf\x74\x86\x6a\x08\xcf\xe4\xff\xe3\xa6\x82\x4a\x4e\x10\xb9\xa6\xf0\xdd\x92\x1f\x01\xa7\x0c\x4a\xfa\xab\x73\x9d\x77\x00\xc2\x9f\x52\xc5\x7d\xb1\x7c\x62\x0a\x86\x52\xbe\x5e\x90\x01\xa8\xd6\x6a\xd7\xc1\x76\x69\x10\x19\x99\x02\x4a\xf4\xd0\x27\x27\x5a\xc1\x34\x8b\xb8\xa7\x62\xd0\x52\x1b\xc9\x8a\xe2\x47\x15\x04\x22\xea\x1e\xd4\x09\x93\x9d\x54\xda\x74\x60\xcd\xb5\xf6\xc6\xb2\x50\x71\x7c\xbe\xf1\x80\xeb\x34\x11\x8e\x98\xd1\x19\x52\x9a\x45\xd6\xf8\x34\x56\x6e\x30\x25\xe3\x16\xa3\x30\xef\xbb\x77\xa8\x6f\x0c\x1a\xb1\x5b\x05\x1a\xe3\xd4\x28\xc8\xf8\xac\xb7\x0a\x81\x37\x15\x0b\x8e\xeb\x10\xe1\x83\xed\xd1\x99\x63\xdd\xd9\xe2\x63\xe4\x77\x05\x89\xef\x6a\xa2\x1e\x7f\x5f\x2f\xf3\x81\xb5\x39\xcc\xe3\x40\x9d\x13\xcd\x56\x6a\xfb\xb4\x8d\x6c\x01\x91\x81\xe1\xbc\xfe\x94\xb3\x02\x69\xed\xfe\x72\xfe\x9b\x6a\xa4\xbd\x7b\x5a\x0f\x1c\x71\xcf\xff\x4c\x19\xc4\x18\xe1\xf6\xec\x01\x79\x81\xbc\x08\x7f\x2a\x70\x65\xb3\x84\xb8\x90\xd3\x19\x1f\x2b\xfa\x02\x1d\x00\x80\x1c\x0d\x34\xc5\x8d\x93\xfe\x99\x71\x77\x10\x1f\x80\x53\x5a\x47\x38\xce\xbc\xbf\x38\x9a\x99\xb3\x63\x71\xeb\x03\x82\x01\x06\x00\x02\x82\x01\x01\x00\x82\xc1\x65\xbb\x57\x62\x43\xec\xf4\x6d\x58\xc3\xd1\x50\x16\x16\x95\x5f\xca\x03\x20\xfa\x95\xea\x11\xd2\xe6\xc1\xb9\xcf\x21\x76\x76\x72\x0d\xc1\xc0\x8c\x85\xbf\x20\xc4\xd2\x32\xb6\x0a\x29\xa1\xe5\x1c\x7b\x77\x3b\xc6\x45\x01\x45\x87\xc5\x25\xc8\x61\x51\xb3\x0d\x75\x48\x6e\xc7\xb6\xc9\x8e\xfb\x5f\x74\x95\x5b\x83\x11\x6d\x01\xd0\xaf\x12\x32\xaf\x89\x21\x3c\x2d\xe5\x74\x36\x9d\x70\x1a\xba\x93\x57\x30\x0b\x92\x0d\x3d\x8b\x98\x25\x2d\x46\xc4\x69\x52\xc1\x6a\x5f\x33\x55\x4b\x38\x31\x78\x09\xc7\xb9\xad\xd4\x70\x1f\x5c\x15\x8c\x1b\x70\x35\xe9\xfe\x39\x36\x6e\xce\xcb\x90\xd2\x89\x6b\x78\xc5\x23\xc4\xa5\x77\x28\x7e\xf5\xba\x7a\x26\x63\xed\x58\xaa\x20\xb5\xec\x66\xe3\x0f\x31\x66\x10\xdf\xaa\x38\x58\x3e\x49\x5a\xb6\xaf\x77\x1c\x28\x43\x87\xe6\x60\xed\xbe\xf4\xed\xb8\x72\xe2\xe8\x0e\x1d\x24\x4e\xe9\x56\x22\xe7\x6d\x02\x8e\x61\xc1\xe8\x87\xc2\xaa\x79\x27\x17\x36\x21\x39\xf4\xdd\x26\xea\xfd\x49\xb2\x36\x6e\xeb\x23\x50\xb0\x1f\xe1\xb5\x60\x22\xa2\x80\x9e\x37\x95\x59\xc3\x7b\x37\x5b\xa0\x1c\x4e\xaa\xcc\x14\xfd\x1b\x24\x78\x37" ); |
402 | } |
403 | |
404 | #[test ] |
405 | #[cfg (ossl102)] |
406 | fn test_dh_stored_restored() { |
407 | let dh1 = Dh::get_2048_256().unwrap(); |
408 | let key1 = dh1.generate_key().unwrap(); |
409 | |
410 | let dh2 = Dh::get_2048_256().unwrap(); |
411 | let key2 = dh2 |
412 | .set_private_key(key1.private_key().to_owned().unwrap()) |
413 | .unwrap(); |
414 | |
415 | assert_eq!(key1.public_key(), key2.public_key()); |
416 | assert_eq!(key1.private_key(), key2.private_key()); |
417 | } |
418 | |
419 | #[test ] |
420 | #[cfg (ossl102)] |
421 | fn test_set_keys() { |
422 | let dh1 = Dh::get_2048_256().unwrap(); |
423 | let key1 = dh1.generate_key().unwrap(); |
424 | |
425 | let dh2 = Dh::get_2048_256().unwrap(); |
426 | let key2 = dh2 |
427 | .set_public_key(key1.public_key().to_owned().unwrap()) |
428 | .unwrap(); |
429 | |
430 | assert_eq!(key1.public_key(), key2.public_key()); |
431 | |
432 | let dh3 = Dh::get_2048_256().unwrap(); |
433 | let key3 = dh3 |
434 | .set_key( |
435 | key1.public_key().to_owned().unwrap(), |
436 | key1.private_key().to_owned().unwrap(), |
437 | ) |
438 | .unwrap(); |
439 | assert_eq!(key1.public_key(), key3.public_key()); |
440 | assert_eq!(key1.private_key(), key3.private_key()); |
441 | } |
442 | |
443 | #[test ] |
444 | fn test_dh_from_pem() { |
445 | let mut ctx = SslContext::builder(SslMethod::tls()).unwrap(); |
446 | let params = include_bytes!("../test/dhparams.pem" ); |
447 | let dh = Dh::params_from_pem(params).unwrap(); |
448 | ctx.set_tmp_dh(&dh).unwrap(); |
449 | } |
450 | |
451 | #[test ] |
452 | fn test_dh_from_der() { |
453 | let params = include_bytes!("../test/dhparams.pem" ); |
454 | let dh = Dh::params_from_pem(params).unwrap(); |
455 | let der = dh.params_to_der().unwrap(); |
456 | Dh::params_from_der(&der).unwrap(); |
457 | } |
458 | |
459 | #[test ] |
460 | #[cfg (ossl102)] |
461 | fn test_dh_generate_key_compute_key() { |
462 | let dh1 = Dh::get_2048_224().unwrap().generate_key().unwrap(); |
463 | let dh2 = Dh::get_2048_224().unwrap().generate_key().unwrap(); |
464 | |
465 | let shared_a = dh1.compute_key(dh2.public_key()).unwrap(); |
466 | let shared_b = dh2.compute_key(dh1.public_key()).unwrap(); |
467 | |
468 | assert_eq!(shared_a, shared_b); |
469 | } |
470 | |
471 | #[test ] |
472 | fn test_dh_generate_params_generate_key_compute_key() { |
473 | let dh_params1 = Dh::generate_params(512, 2).unwrap(); |
474 | let dh_params2 = Dh::from_pqg( |
475 | dh_params1.prime_p().to_owned().unwrap(), |
476 | None, |
477 | dh_params1.generator().to_owned().unwrap(), |
478 | ) |
479 | .unwrap(); |
480 | |
481 | let dh1 = dh_params1.generate_key().unwrap(); |
482 | let dh2 = dh_params2.generate_key().unwrap(); |
483 | |
484 | let shared_a = dh1.compute_key(dh2.public_key()).unwrap(); |
485 | let shared_b = dh2.compute_key(dh1.public_key()).unwrap(); |
486 | |
487 | assert_eq!(shared_a, shared_b); |
488 | } |
489 | |
490 | #[test ] |
491 | fn test_dh_check_key() { |
492 | let dh1 = Dh::generate_params(512, 2).unwrap(); |
493 | let p = BigNum::from_hex_str("04" ).unwrap(); |
494 | let g = BigNum::from_hex_str("02" ).unwrap(); |
495 | let dh2 = Dh::from_pqg(p, None, g).unwrap(); |
496 | assert!(dh1.check_key().unwrap()); |
497 | assert!(matches!(dh2.check_key(), Ok(false) | Err(_))); |
498 | } |
499 | } |
500 | |